• In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol...
    31 KB (3,618 words) - 05:23, 19 September 2024
  • Thumbnail for Timing attack
    In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute...
    12 KB (1,524 words) - 16:41, 5 September 2024
  • Thumbnail for Advanced Encryption Standard
    successful published attacks against the full AES were side-channel attacks on some specific implementations. In 2009, a new related-key attack was discovered...
    49 KB (5,566 words) - 22:30, 30 October 2024
  • (TMTO) attacks, but introduces possible side-channel attacks. Argon2i is optimized to resist side-channel attacks. It accesses the memory array in a password...
    14 KB (1,491 words) - 06:28, 21 August 2024
  • most devastating practical consequence of the side-channel analysis is an attack in which an attacker, having previously learned the system's master...
    13 KB (1,561 words) - 23:57, 27 May 2024
  • In cryptography, electromagnetic attacks are side-channel attacks performed by measuring the electromagnetic radiation emitted from a device and performing...
    27 KB (3,404 words) - 16:42, 5 September 2024
  • A DMA attack is a type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, by exploiting the presence...
    11 KB (1,295 words) - 21:14, 22 May 2024
  • Hail Mary Cloud Key derivation function MD5CRK Metasploit Express Side-channel attack TWINKLE and TWIRL Unicity distance RSA Factoring Challenge Secure...
    21 KB (2,238 words) - 08:30, 28 September 2024
  • Consequently, it is important to counteract side-channel attacks (e.g., timing or simple/differential power analysis attacks) using, for example, fixed pattern...
    39 KB (4,674 words) - 13:00, 24 September 2024
  • Thumbnail for Computer security
    other values that normally should be inaccessible. In Side-channel attack scenarios, the attacker would gather such information about a system or network...
    220 KB (22,283 words) - 00:03, 1 November 2024
  • security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access...
    38 KB (4,246 words) - 11:43, 3 November 2024
  • not be written to disk. In 2019, security researchers demonstrated side-channel attacks against the page cache: it's possible to bypass privilege separation...
    7 KB (807 words) - 12:57, 19 October 2024
  • Serge Vaudenay's padding oracle attack that was previously thought to have been fixed, that uses a timing side-channel attack against the message authentication...
    3 KB (362 words) - 04:26, 17 October 2023
  • Thumbnail for Tempest (codename)
    intelligence-bearing signals which, if intercepted and analyzed (side-channel attack), may disclose the information transmitted, received, handled, or...
    35 KB (4,254 words) - 20:15, 24 October 2024
  • Cache timing attacks also known as Cache attacks are a type of side-channel attack that allows attackers to gain information about a system purely by...
    3 KB (303 words) - 03:45, 5 December 2023
  • MD5 (redirect from MD5 attack)
    discoveries had relied on multi-block attacks.) For "security reasons", Xie and Feng did not disclose the new attack method. They issued a challenge to the...
    47 KB (4,712 words) - 21:30, 30 August 2024
  • Thumbnail for Power analysis
    Power analysis (category Side-channel attacks)
    is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic...
    10 KB (1,234 words) - 07:12, 10 October 2024
  • BREACH attacks are examples of protocol attacks using this phenomenon. Side-channel attack Jason Coombs (2 December 2004). "Understanding Oracle Attacks"....
    2 KB (249 words) - 23:25, 24 November 2023
  • A man-on-the-side attack is a form of active attack in computer security similar to a man-in-the-middle attack. Instead of completely controlling a network...
    9 KB (1,183 words) - 07:54, 9 October 2024
  • Thumbnail for Encryption
    inherent biases and backdoors or by exploiting physical side effects through Side-channel attacks. For example, RC4, a stream cipher, was cracked due to...
    34 KB (3,640 words) - 21:56, 15 October 2024
  • Crypto Library, which was used notably by Firefox and Chrome. A side-channel attack using branch-prediction analysis (BPA) has been described. Many processors...
    60 KB (7,773 words) - 06:12, 2 November 2024
  • Thumbnail for HMAC
    communicating parties, who are responsible for establishing and using a trusted channel to agree on the key prior to communication. Any cryptographic hash function...
    18 KB (2,335 words) - 04:57, 18 October 2024
  • consumption, or branch measurements are exposed to an attacker performing a side-channel attack. The algorithm uses the same representation as from double-and-add...
    30 KB (4,086 words) - 15:38, 27 March 2024
  • Transient execution CPU vulnerability (category Side-channel attacks)
    transient execution attacks like Spectre belong to the cache-attack category, one of several categories of side-channel attacks. Since January 2018 many...
    64 KB (4,465 words) - 04:37, 29 October 2024
  • Thumbnail for Meltdown (security vulnerability)
    during instruction processing. Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege...
    87 KB (8,241 words) - 09:13, 15 August 2024
  • Thumbnail for Spectre (security vulnerability)
    vulnerabilities (the other being Meltdown), which involve microarchitectural side-channel attacks. These affect modern microprocessors that perform branch prediction...
    82 KB (6,996 words) - 11:15, 27 October 2024
  • leaked through a side-channel. The earliest well-known attack that uses a padding oracle is Bleichenbacher's attack of 1998, which attacks RSA with PKCS...
    15 KB (1,792 words) - 08:57, 27 September 2024
  • sliding computational cost, used to reduce vulnerability to brute-force attacks. PBKDF2 is part of RSA Laboratories' Public-Key Cryptography Standards...
    13 KB (1,341 words) - 15:37, 30 May 2024
  • bench.cr.yp.to. Tao, Xie; Liu, Fanbao; Feng, Dengguo (2013). Fast Collision Attack on MD5 (PDF). Cryptology ePrint Archive (Technical report). IACR. Stevens...
    3 KB (464 words) - 07:05, 4 October 2024
  • of network eavesdropping in which special equipment is used for a side-channel attack on the electromagnetic emissions of electronic devices. While electromagnetic...
    13 KB (1,475 words) - 22:02, 3 November 2024